Business > EXAM > ISYS 209 Exam 3 | Questions with complete solutions (All)

ISYS 209 Exam 3 | Questions with complete solutions

Document Content and Description Below

ISYS 209 Exam 3 | Questions with complete solutions According to the information in this video, the telephone system is an example of a _____ network circuit-switched As Zero and One explain in this... video, a _____ must be used to convert an analog signal to a digital signal when transmitting data through a typical telephone line. Modem According to the information in this video, computers represent data using _____. Bits In this video, One-Bit describes how voices travel through typical telephone transmission lines. He is describing a(n) _____. analog signal In this video, One-Bit describes _____, the method of slicing digital messages into parcels, transmitting them across communication networks, and reassembling them at their destination. packet switching Which of the following is FALSE about the TCP/IP protocol? IP helps to recover any packets that are lost or damaged during transmission. At its most basic level, a(n) _________ simply consists of two computers that are connected together. Network If you wanted to have wireless connectivity in your home or apartment, you would need a _________________ to move packets of data to your different devices. Router Microsoft Windows Server and Linux are examples of: network operating systems. A ________ is a set of rules that programs on two communicating devices follow. Protocol A(n) __________________ is a way to communicate in a network that is recognized by a continuous waveform: analog signal The signal from your iPod earphone is a(n): analog signal. Network signals that are represented by on-off pulses indicate a(n): digital signal. If you were building a network intended to service two buildings that were next to each other, you would construct a: local area network. A company needing a network to connect its offices in Montana, Idaho, and Utah would require a: wide area network. Bandwidth is determined by: determining the difference between the highest and lowest frequency on a channel. If you are creating a network using twisted-pair (CAT 5) wire, the cable shouldn't exceed: 100 meters. In the Dundee Precious Metals (DPM) case, what technology was added to dramatically increase productivity and improve safety? An underground wireless Wi-Fi network The method of slicing digital messages into parcels, transmitting them along different communication paths, and reassembling them at their destinations is called ________. packet switching The Internet is based on which of the following three key technologies? Client/server computing, packet switching, and TCP/IP and related communications standards for linking networks and computers A company needing reliable network speeds at 1.5 Mbps would probably need to lease a dedicated: T1 line Which is the BEST definition of hertz? The number of cycles per second that can be sent through a medium Which single word below best describes Web 2.0? Dynamic Which of the following is NOT a function of the Internet service provider (ISP)? The ISP provides applications services. Which of the following could represent a current IP address? 207.46.250.119 Education being represented by .edu and business represented by .com are examples of: top level domains Which of the following TCP/IP application-layer protocols is used for email transmission? SMTP What is the name of the organization responsible for assigning public IP addresses? ICANN Which of the following is FALSE about the Domain Name Service (DNS)? The first name in the domain name is the organization name. Which of the following is a wireless protocol designed for transmitting data over short distances, replacing cables? Bluetooth According to the DHS agent portrayed in this video, the Secret Service has responded to network intrusions at businesses throughout the United States that have been impacted by _____ through their point-of-sale systems. Malware In this video, Agent Macey explains how a _____ pretends to be a legitimate company and sends email requesting users to update their confidential information such as passwords or account numbers. Spoofer Based on the information provided in this video, which of the following usually happens in a denial-of-service attack? A hacker floods a Web server with so many requests that it becomes unavailable to its intended users. In this video, Special Agent Macey says the single largest threat to the Internet is _____. denial-of-service attacks According to the information provided in this video, any business that has an online presence is at risk of _____. exposure to hacker activity denial-of-service attack unauthorized data disclosure loss of customer data all of the above ______________________ is a general security term that includes computer viruses, worms, and Trojan horses. Malware Which of the following is an opportunity for threats to gain access to assets? Vulnerability A _______________ is a program that seems like a normal program, but does something completely unexpected. Trojan horse A __________ is a unique type of malware that replicates itself from one computer to another. Worm A ___________ is a type of spyware that records keystrokes to steal sensitive information such as social security numbers. Keylogger Someone hacking into your Facebook account to add terrible photos and messages is taking part in _________________. Cybervandalism Taking over computers and directing those systems to overload a network is defined as a(n) _____________ attack. denial-of-service If you receive an email asking for your social security number in return for a million dollars, this is an example of _______________. Phishing ____________________ is an increasing problem where hackers lock parts of your computer and then demand money to unlock the system. Ransomware Although it may seem innocent enough, ___________ is a serious problem for companies that are involved with pay-per-click advertising. click fraud The ________________ virus, a rather nice sounding virus, was one of the most famous malwares that was detected in 2000. ILOVEYOU _______________ requires that your patient records be protected and saved for six years. HIPAA Which act requires financial institutions to ensure the security and confidentiality of customer data and mandates that data must be stored on a secure medium and protected during storage and transmittal? Gramm-Leach-Bliley Act _____________ provides rules related to the creation of financial statements to help avoid fraud. Sarbanes-Oxley Act Establishing a risk level of malware threats to an organization is an example of _______________. risk assessment Tricking employees to reveal their passwords by pretending to be a legitimate member of a company is referred to as ________. social engineering Electronic evidence on computer storage media that is not visible to the average user is called ________. ambient data Which of the following is a critical security function of senior management in anorganization? Establishing the security policy and managing risk ___________________ is the ability to determine that a person is who he or she claims to be through a variety of means. Authentication Gaining access to a safety deposit box using iris scanning is an example of _____________ authentication. Biometric Which of the following is NOT addressed by a business continuity plan? The technical issues involved in keeping systems up and running Which of the following examine(s) data files and sorts out low-priority online material while assigning higher priority to business-critical files? Deep packet inspection Which of the following is FALSE regarding public-key encryption? On receiving the message, the recipient uses the public key to decrypt it. [Show More]

Last updated: 2 hours ago

Preview 4 out of 14 pages

Add to cart

Instant download

We Accept:

We Accept
loader

Loading document previews ...

Buy this document to get the full access instantly

Instant Download Access after purchase

Add to cart

Instant download

We Accept:

We Accept

Reviews( 0 )

$15.00

Add to cart

We Accept:

We Accept

Instant download

Can't find what you want? Try our AI powered Search

OR

REQUEST DOCUMENT
5
0

Document information


Connected school, study & course


About the document


Uploaded On

Jul 18, 2024

Number of pages

14

Written in

Seller


seller-icon
Ajay25

Member since 3 years

132 Documents Sold


Additional information

This document has been written for:

Uploaded

Jul 18, 2024

Downloads

 0

Views

 5

Document Keyword Tags

Recommended For You

Get more on EXAM »

$15.00
What is Browsegrades

In Browsegrades, a student can earn by offering help to other student. Students can help other students with materials by upploading their notes and earn money.

We are here to help

We're available through e-mail, Twitter, Facebook, and live chat.
 FAQ
 Questions? Leave a message!

Follow us on
 Twitter

Copyright © Browsegrades · High quality services·